Published by Global Banking and Finance Review
Posted on February 3, 2026
2 min readLast updated: February 3, 2026
Published by Global Banking and Finance Review
Posted on February 3, 2026
2 min readLast updated: February 3, 2026
French prosecutors are expanding their investigation into Elon Musk's X platform, focusing on AI chatbot Grok and data-related allegations.
(Refiles to change media identifier to align with main story, no changes to text)
PARIS, Feb 3 (Reuters) - French prosecutors said on Tuesday they were widening an investigation into Elon Musk's social media platform X and that they have summoned the tech billionaire for questioning in April.
A probe into alleged abuse of algorithms and fraudulent data extraction was launched in January 2025. That has now been expanded following complaints over X's AI chatbot Grok, they said.
Here are the potential crimes the Paris prosecutor says it is now investigating:
* Complicity in the possession of images of minors of apornographic nature * Complicity in the organised distribution, offering, ormaking available of images of minors of a pornographic nature * Defamation of a person's image (deepfakes of sexualnature) * Denial of crimes against humanity (Holocaust denial) * Fraudulent extraction of data from an automated dataprocessing system by an organised group * Falsification of the operation of an automated dataprocessing system by an organised group * Operating of an illegal online platform by an organisedgroup.(Reporting by Dominique Patton; editing by Richard Lough)
An algorithm is a set of rules or instructions designed to perform a specific task or solve a problem, often used in computing and data processing.
Data extraction is the process of retrieving data from various sources for further processing or analysis, commonly used in data management and analytics.
Defamation is the act of communicating false statements about a person that can harm their reputation, which can be pursued legally.
Cybersecurity involves protecting computer systems and networks from theft, damage, or unauthorized access, ensuring the confidentiality and integrity of data.
Explore more articles in the Headlines category